System Administrator 2026
What are the common security threats?
  • A. File shredding
  • B. File sharing and permission
  • C. File corrupting
  • D. File integrity
Which of the following is a good practice?
  • A. Give full permission for remote transferring
  • B. Grant read only permission
  • C. Grant limited permission to specified account
  • D. Give both read and write permission but not execute
What is not a good practice for user administration?
  • A. Isolating a system after a compromise
  • B. Perform random auditing procedures
  • C. Granting privileges on a per host basis
  • D. Using telnet and ftp for remote access
Which of the following is the least secure method of authentication?
  • A. Key card
  • B. Fingerprint
  • C. Retina pattern
  • D. Password
Which of the following is a strong password?
  • A. 19thaugust88
  • B. Delhi88
  • C. P@assw0rd
  • D. !augustdelhi
Why is one time password safe?
  • A. It is easy to generated
  • B. It cannot be shared
  • C. It is different for every access
  • D. It is a complex encrypted password
What does Light Directory Access Protocol (LDAP) doesn’t store?
  • A. Users
  • B. Address
  • C. Passwords
  • D. Security keys
What is characteristic of RADIUS system?
  • A. It is essential for centralized encryption and authentication
  • B. It works on network layer to deny access to unauthorized people
  • C. It provides centralized authentication mechanism via network devices
  • D. It’s a strong file access system
Which happens first authorization or authentication?
  • A. Authorization
  • B. Authentication
  • C. Authorization & authentication are same
  • D. None of the mentioned